The report aims at creating a database for Butler Financing Company which provides mortgages to the borrowers by matching their requests with the lending capacity of lenders. The entire storing of data has been done in spreadsheet up till now. But due to increase in the customer base, there has been a rise in the issues of data consistency.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Table of Contents Introduction......................................................................................................................................2 Justification of the use of database..................................................................................................2 ER diagram......................................................................................................................................3 Microsoft Access.............................................................................................................................4 BORROWER table..................................................................................................................................4 LENDER table........................................................................................................................................4 PROPERTY_APPRAISR table...............................................................................................................5 MORTGAGE_REQUEST table..............................................................................................................5 Queries....................................................................................................................................................5 Forms......................................................................................................................................................6 Reports....................................................................................................................................................7 IT security and Privacy............................................................................................................................7 Database risks..........................................................................................................................................7 Data Tampering......................................................................................................................................................7 Unauthorized Access to Tables and Columns........................................................................................................7 Unauthorized Access to Data Rows.......................................................................................................................8 Lack of Accountability...........................................................................................................................................8 Data Security Requirements....................................................................................................................8 Confidentiality.......................................................................................................................................................8 Privacy of Communications...................................................................................................................................8 Secure Storage of Sensitive Data...........................................................................................................................8 Authentication........................................................................................................................................................8 Conclusion.......................................................................................................................................9 References........................................................................................................................................9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction The report aims at creating a database for Butler Financing Company which provides mortgages to the borrowers by matching their requests with the lending capacity of lenders. The entire storing of data has been done in spreadsheet up till now. But due to increase in the customer base, there has been a rise in the issues of data consistency. The manual feeding of data in the spreadsheet has led to cancellation of various mortgages, over or unpaid mortgages to the lenders. Other inconsistencies include double entry of mortgages, borrowers and lenders. Along with this, there are various data security risks in the current spreadsheet data storage mechanism i.e. illegal access to users, unauthenticated entry of data or modifying/adding columns in the spreadsheet. As a result of these data issues and inconsistencies, it has been proposed to transfer data from spreadsheet to a database management system. The database for the Butler company has been decided to be made using Microsoft Access. Justification of the use of database The use of database for the company would bring in several business advantages. Some of the advantages may be realized sooner and some over time. Following are the key advantages from using the database system. Control of data redundancy The database approach would ultimately help to reduce any redundancy that will brought in by using other methods. As mentioned, the database will not completely remove the redundancies but controls the amount of redundancy being introduced in the database. Control of data consistency The database approach would ultimately help to reduce any inconsistency that will brought in by using other methods. As mentioned, the database will not completely remove the inconsistencies but controls the amount of inconsistency being introduced in the database. More information It may be possible to extract additional data and results by integration of database with analytics and intelligence tools to derive additional information using the same data. Employing a database system makes the data virtually available to all people in the organization as well as remote employees(Date, Kannan and Swamynathan, 2006). Employing a database system improves the data integrity of the database because of inbuilt consistency and validity mechanisms built in. The database is not permitted to violate any constraints as defined by the administrator.
The security of the database can also be increased by simply employing the use of a database system. This is because, the database can be prevented from unathorized use by simply employing the use of usernames and passwords. The database can also include enforcement of standards such as documentation standards, data formats, update procedures, naming conventions and so on. Economies of scale can be enforced by combining all organizational data into one place and streamlining the administrator and usage of database systems. Improvement of responsiveness and data accessibility can be achieved. This is because an optimized database management system can prove to be extremely fast and efficient at retrieving queries and performing data operations. The database approach is able to provide a low-level file handling-based routine. These kinds of provisions allow operators to focus their energy on a specific functionality rather than the whole. By employing a centralized database system, various different conflicts and differences between departments and users could be resolved. Decisions would then be based on the use of resources for organization rather than a single entity. Database system also brings in about a change in the maintenance of data. Through the use of a database system, systematic maintenance of database can be greatly improved (Middleton, 2012). The database system can inherently be encrypted by different levels of encryption apart from also having tier-based access. This increases the security of database and enforces strong protection mechanisms for it. Database system also allows for concurrent user-based access. This means that multiple people can use the database without having to interfere other’s work or restrict other’s work. The database would be continuously backed up to on-site and off-site storage. This adds another layer of protection as the database remains safe at all times. In the event of any disaster or breach, the data can be restored promptly. ER diagram Following entities have been identified for the proposed Butler Financing company: EntityDescription / Attributes BORROWERThis entity represents a person who requests for mortgage from company.
Attributesï‚·Borrower No ï‚·Last Name ï‚·First Name ï‚·Current Address LENDERThis entity represents a person who lends money corresponding to a mortgage request from the BORROWER. Attributesï‚·Lender No ï‚·Lender Name ï‚·Lender Office Address PROPERTY_APPRAISERThis entity represents a person/company who measures property against the mortgage value. Attributesï‚·Property Appraiser No ï‚·Property Appraiser Name MORTGAGE requestThis entity is an associative entity among BORROWER, LENDER and PROPERTY _APPRAISER entities. Attributesï‚·Borrower No ï‚·Lender No ï‚·Property Appraiser No Microsoft Access BORROWER table Field NameData Type
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
borrowerNoNumber lastNameText firstNameText AddressText LENDER table Field NameData Type lenderNoNumber lenderNameText AddressText PROPERTY_APPRAISR table Field NameData Type propertyAppraiserNoNumber propertyAppraiserNameText MORTGAGE_REQUEST table Field NameData Type borrowerNoNumber lenderNoNumber appraiserNoNumber amountDecimal (Guan, 2012) Queries
select b.borrowerID, b.firstName, p.propertyAppraiserName FROM BORROWER b, MORTGAGE_REQUEST m,PROPERTY_APPRAISER p, lender l where b.borrowerID = m.borrowerNo AND m.lenderNo = l.lenderNo AND m.apprasierNo = p.propertyAppraiserNo AND l.lenderName = 'Excel Mortgage' Forms
Reports IT security and Privacy Database risks Following are key data security risks: Data Tampering Data tampering is among the biggest concerns of database. The database would be concurrentlyviewed,accessedandoperatedbymultipleusersinadistributed environment. As the data moves across different sites the chances of a modification- based attack by an authorized or unauthorized party is possible and therefore becomes a risk. Unauthorized Access to Tables and Columns The database may contain sensitive information contained in columns and tables. These tables should not be indiscriminately to all kinds of authorized users who would be accessing the database. Therefore, database should be protected at the columnar level (Harkins, 2013).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Unauthorized Access to Data Rows Certain data rows could contain highly confidential information and therefore being available to indiscriminate users makes it highly risk. For instance, in shared database environment, the business should only have access to their own data and not be allowed to viewed data of customers such as their passwords of transaction details. Lack of Accountability Another major risk with database system arises out of a poorly setup database which makes it difficult to track user’s activities. If they cannot track the user’s activities then wouldnotbeabletomonitortheirwrongdoingandhence,theycannotbeheld accountable. Data Security Requirements Confidentiality A secure system would ensure data confidentiality. This typically means that only the individuals meant to are able to see the data they are supposed to. Confidentiality has many aspects such as privacy for communications, storage of sensitive data, authorization of users, authenticated users and so on. Privacy of Communications The database system needs to be in control of confidential information being stored in the database. These includes datasets such as employment records, credit information and health records. It also needs to keep copyright, patent and other corporate information such as trade secrets about processes and products, marketing plans, ideas and product launches a secret from unauthorized people. Secure Storage of Sensitive Data Once the data has been entered, then the data’s privacy, integrity and confidentiality must be protected wherever the data resides. Authentication One of the simplest concepts in database security is their authentication, which is nothing but a process on how the system verifies the identity of the user. A user would respond to such request by providing a proof of identity or a token for authentication. A user could have several different kinds of authorization on parts of their database. Following are the authorization rights. oRead authorization – This allows for reading, but does not permit modification of data. oInsert authorization – This allows for insertion of a new data, but does not permit modification of data. oUpdate authorization – This allows for data modification but does not permit data deletion oDelete authorization – This permits data deletion
A user could be assigned to all, none or even a combination of the authorization types mentioned above. There are other forms of authorization given to a user too, these relatedto the modification of database schema: ï‚·Index authorization allows for deletion and creation of indexes. ï‚·Resource authorization allows for creation of new relations. ï‚·Alteration authorization allows for deletion or addition of relation attributes. ï‚·Drop authorization allows for deletion of any relations (Hutchinson and Coulthard, 2013). Conclusion This report has provided an overview of justification of using a database instead of a spreadsheet by detailing the benefits of a database. Along with this, the report provides a normalized structure of the database which is the base of any database. In order to provide the usefulness of proposed database, various entry forms and reports are built using MS Access which proves that database implementation is a wise decision. It minimizes any kind of data inconsistency and redundancy. The report provides an insight over the database security and how it can be implemented in the database to prevent database breach or authorized data access. References Date, C., Kannan, A. and Swamynathan, S. (2006).An introduction to database systems. 1st ed. Noida: Dorling Kindersley, pp.12-14. Guan, K. (2012).Microsoft Access. 1st ed. Sandgate, Qld.: Knowledge Books and Software, pp.12-14. Harkins, S. (2013).Using Microsoft Access 97. 1st ed. Indianapolis, IN: Que, pp.14-19. Hutchinson, S. and Coulthard, G. (2013).Microsoft Access 2000. 1st ed. Boston, Mass.: Irwin/McGraw-Hill, pp.45-47. Middleton, J. (2012).Microsoft Access. 1st ed. London: Pitman, pp.34-36.